Sciweavers

940 search results - page 178 / 188
» Local rely-guarantee reasoning
Sort
View
SIGMETRICS
1998
ACM
187views Hardware» more  SIGMETRICS 1998»
15 years 1 months ago
An Analytic Behavior Model for Disk Drives with Readahead Caches and Request Reordering
Modern disk drives read-ahead data and reorder incoming requests in a workload-dependent fashion. This improves their performance, but makes simple analytical models of them inade...
Elizabeth A. M. Shriver, Arif Merchant, John Wilke...
CVPR
1996
IEEE
15 years 1 months ago
Extracting Salient Curves from Images: An Analysis of the Saliency Network
The Saliency Network proposed by Shashua and Ullman (1988) is a well-known approach to the problem of extracting salient curves from images while performing gap completion. This pa...
T. D. Alter, Ronen Basri
ECAI
1994
Springer
15 years 1 months ago
The DUAL Cognitive Architecture: A Hybrid Multi-Agent Approach
1 A hybrid (symbolic/connectionist) cognitive architecture, DUAL, is proposed. It is a multi-agent system which consist of a large number of non-cognitive, relatively simple agents...
Boicho N. Kokinov
BIBE
2007
IEEE
129views Bioinformatics» more  BIBE 2007»
15 years 1 months ago
Statistial Analysis of nucleosome occupancy and histone modification data
Abstract-- In eukaryotic cells, genomic DNAs wrap around beadlike molecules, called nucleosomes, so as to pack more compactly in the nucleus of the cell. The nucleosome is made up ...
Guo-Cheng Yuan, Jun S. Liu
ISSTA
2010
ACM
15 years 1 months ago
Proving memory safety of floating-point computations by combining static and dynamic program analysis
Whitebox fuzzing is a novel form of security testing based on dynamic symbolic execution and constraint solving. Over the last couple of years, whitebox fuzzers have found many ne...
Patrice Godefroid, Johannes Kinder